Library Search Results

Results from your Search are visible below. You may further refine your search using the Refine Your Results links below, right. Clicking on one of the refinement items will return a subset of your original search. To return to your original results, simply choose the "Any [term] link at the top of each section. You may also sort your results, either by Relevance/Ranking (default result), Title, or Date Modified.

UAB computer and network devices may only be used for work related to the university or for other approved activities. If these resources are used for destructive, disruptive or illegal activities, the right to use these resources may be revoked.

The UAB IT Security Practices are designed to assist UAB IT or Health Systems Information Services system administrators in securing classified data. This document includes a checklist of items which may be used as guidelines for ensuring data security.

All laptops that are used for UAB business must adhere to the Portable Computing Device Security Standards. This document defines these standards and outlines the procedures for protecting a portable computing device.

Refine your results by selecting from the categories and keywords below.